Building a Cybersecurity Program - Houlder, Chris; Mir, Ahsan; - Prospero Internet Bookshop

 
Product details:

ISBN13:9781138626980
ISBN10:1138626988
Binding:Hardback
No. of pages:320 pages
Size:234x156 mm
Language:English
Illustrations: 75 Illustrations, black & white
700
Category:

Building a Cybersecurity Program

 
Edition number: 1
Publisher: Auerbach Publications
Date of Publication:
 
Normal price:

Publisher's listprice:
GBP 66.99
Estimated price in HUF:
35 169 HUF (33 495 HUF + 5% VAT)
Why estimated?
 
Your price:

31 653 (30 146 HUF + 5% VAT )
discount is: 10% (approx 3 517 HUF off)
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
 
Availability:

Not yet published.
 
  Piece(s)

 
Short description:

This book enables security professionals to build a cybersecurity program from the ground up, regardless of the size of their organization. The book includes a high-level, comprehensive overview of all of the capabilities that go into a cybersecurity program (e.g., threat management, incident management, vulnerability management) and helps readers to determine which capabilities must be matured first and to what maturity level based on the risks that their organization faces. The book addresses methods for performing rapid risk assessments at early stages of cybersecurity program development. It also discusses key capabilities that should form the foundation to any cybersecurity program.

Long description:

This book enables security professionals to build a cybersecurity program from the ground up, regardless of the size of their organization. The book includes a high-level, comprehensive overview of all of the capabilities that go into a cybersecurity program (e.g., threat management, incident management, vulnerability management) and helps readers to determine which capabilities must be matured first and to what maturity level based on the risks that their organization faces. The book addresses methods for performing rapid risk assessments at early stages of cybersecurity program development. It also discusses key capabilities that should form the foundation to any cybersecurity program.